Back to Results
First PageMeta Content
Finite fields / Key management / Public-key cryptography / Advantage / CBC-MAC / CMAC / Block cipher / Cipher / Key size / Cryptography / Message authentication codes / Block cipher modes of operation


Related-Key and Key-Collision Attacks Against RMAC Tadayoshi Kohno CSE Department, UC San Diego 9500 Gilman Drive, MC-0114 La Jolla, California, USA
Add to Reading List

Document Date: 2002-12-02 19:59:21


Open Document

File Size: 171,05 KB

Share Result on Facebook

City

La Jolla / /

Company

AES / Knudsen / /

Event

FDA Phase / /

IndustryTerm

generation algorithm / ePrint server / Internet users / exhaustive key search / verification algorithm / exhaustive search / /

Organization

Related-Key and Key-Collision Attacks Against RMAC Tadayoshi Kohno CSE Department / /

Person

Tadayoshi Kohno / Chris Mitchell / /

Position

intended correspondent / /

Product

Lu2 / K2v / L1 / K2u / /

ProvinceOrState

California / /

Technology

The RMAC verification algorithm / verification algorithm / block cipher / three algorithms / RMAC algorithm / k-bit key K. The RMAC algorithm / tagging algorithm / key generation algorithm / RMAC tagging algorithm / SSL / /

SocialTag